Programming iOS 8
Start building apps for iOS 8 with Apple’s Swift programming language. If you’re grounded in the basics of Xcode and the Cocoa framework, this book pr ...
Perceptual Image Coding with Di ...
This book first introduces classic as well as recent computational models for just-noticeable-difference (JND) applications. Since the discrete cosine ...
Simply SQL
Packed with examples, Simply SQL is a step-by-step introduction to learning SQL. You’ll discover how easy it is to use SQL to interact with best-pract ...
Real-Time Visual Effects for Ga ...
This book introduces the latest visual effects (VFX) techniques that can be applied to game programming. The usefulness of the physicality-based VFX t ...
An Introduction to Python and C ...
This book introduces Python programming language and fundamental concepts in algorithms and computing. Its target audience includes students and engin ...
Crowdsourcing: Cloud-Based Soft ...
This book presents the latest research on the software crowdsourcing approach to develop large and complex software in a cloud-based platform. It deve ...
Database Design Using Entity-Re ...
Essential to database design, entity-relationship (ER) diagrams are known for their usefulness in mapping out clear database designs. They are also we ...
Machine Learning Paradigms: App ...
This timely book presents Applications in Recommender Systems which are making recommendations using machine learning algorithms trained via examples ...
Handbook of Mathematical Method ...
The Handbook of Mathematical Methods in Imaging provides a comprehensive treatment of the mathematical techniques used in imaging science. The materia ...
Probabilistic Graphical Models: ...
This accessible text/reference provides a general introduction to probabilistic graphical models (PGMs) from an engineering perspective. The book cove ...
Cyberspace and Cybersecurity
English | ISBN: 1466501332 | 2012 | 236 pages | PDF | 2 MBBased on relate Based on related courses and research on the cyber environment in Europe, th ...
Correct Software in Web Applica ...
The papers in this volume aim at obtaining a common understanding of the challenging research questions in web applications comprising web information ...
Bayesian Natural Language Seman ...
The contributions in this volume focus on the Bayesian interpretation of natural languages, which is widely used in areas of artificial intelligence, ...
Computational Intelligence for ...
The work presented in this book is a combination of theoretical advancements of big data analysis, cloud computing, and their potential applications i ...
Game User Experience Evaluation
Evaluating interactive systems for their user experience (UX) is a standard approach in industry and research today. This book explores the areas of g ...
Patterns of HCI Design and HCI ...
As interactive systems are quickly becoming integral to our everyday lives, this book investigates how we can make these systems, from desktop and mob ...
XSLT cookbook, 2nd Edition
Forget those funky robot toys that were all the rage in the ’80s, XSLT (Extensible Stylesheet Transformations) is the ultimate transformer. This power ...
Sublinear Algorithms for Big Da ...
The brief focuses on applying sublinear algorithms to manage critical big data challenges. The text offers an essential introduction to sublinear algo ...
Software Engineering Design: Th ...
Taking a learn-by-doing approach, Software Engineering Design: Theory and Practice uses examples, review questions, chapter exercises, and case study ...
Official (ISC)2 Guide to the CI ...
The Certified Information Systems Security Professional-Information Systems Security Management Professional (CISSP-ISSMP®) certification was develope ...
Foundations of Semantic Web Tec ...
With more substantial funding from research organizations and industry, numerous large-scale applications, and recently developed technologies, the Se ...
Game AI Pro: Collected Wisdom o ...
Successful games merge art and technology in truly unique ways. Fused under tight production deadlines and strict performance requirements, shaped by ...
Masterkurs Client/Server-Progra ...
Anwendungen entwickeln mit Standard-Technologien: UDP, TCP, JMS, RMI, HTTP, WebSocket, XML-RPC, JAX-WS und JAX-RS Die hier behandelten Themen sind gru ...
Aspect-Oriented Security Harden ...
This book comprehensively presents a novel approach to the systematic security hardening of software design models expressed in the standard UML langu ...
Web Cartography: Map Design for ...
Web mapping technologies continue to evolve at an incredible pace. Technology is but one facet of web map creation, however. Map design, aesthetics, a ...